How to cheat at designing security for a Windows Server 2003 network
Annotation
Άλλοι συγγραφείς: | Amini, Rob., Hunter, Laura E. |
---|---|
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Rockland, Mass. :
Syngress Pub.,
c2006.
|
Σειρά: |
How to Cheat Ser.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781597492430 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
LEADER | 03005nam a2200421 a 4500 | ||
---|---|---|---|
001 | 1/44911 | ||
008 | 140724s2006 us 001 0 eng | ||
020 | |a 9781597492430 | ||
020 | |a 1597492434 | ||
020 | |z 1597492434 | ||
020 | |z 9780080488967 | ||
020 | |a 008048896X | ||
020 | |a 9780080488967 | ||
035 | |l 47868 | ||
040 | |a NTG |b eng |c NTG |d REDDC |d ZCU |d OCLCQ |d DKDLA |d MERUC |d CCO |d E7B |d IDEBK |d OCLCQ |d OCLCO |d S4S |d OCLCQ |d OPELS |d OKU |d FVL |d B24X7 |d UMI |d DEBSZ |d OCLCQ |d GR-PeUP | ||
245 | 0 | 0 | |a How to cheat at designing security for a Windows Server 2003 network |h [electronic resource] / |c Rob Amini ... [et al.] ; Laura E. Hunter, technical editor. |
246 | 3 | 0 | |a Designing security |
260 | |a Rockland, Mass. : |b Syngress Pub., |c c2006. | ||
300 | |a 1 online resource (x, 575 p.) : |b ill. | ||
490 | 1 | |a How to Cheat Ser. | |
500 | |a Title from title screen. | ||
500 | |a Includes index. | ||
520 | 8 | |a Annotation |b Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.<br /><br />While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization's security needs.<br /><br />* The Perfect Guide if "System Administrator is NOT your primary job function<br /><br />* Avoid "time drains" configuring the many different security standards built into Windows 2003<br /><br />* Secure VPN and Extranet Communications. | |
505 | 0 | |a Designing a secure network framework -- Securing servers based on function -- Designing a secure public key infrastructure -- Securing the network management process -- Securing network services and protocols -- Securing internet information services -- Securing VPN and extranet communications -- Securing active directory -- Securing network resources -- Securing network clients. | |
650 | 4 | |a Computer networks |x Security measures. | |
650 | 4 | |a Database security. | |
650 | 4 | |a Computer security. | |
630 | 0 | 4 | |a Microsoft Windows server. |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Amini, Rob. | |
700 | 1 | |a Hunter, Laura E. | |
830 | 0 | |a How to Cheat Ser. | |
852 | |a INST |b UNIPILB |c EBOOKS |e 20140901 |p 00b47868 |q 00b47868 |t ONLINE |y 0 | ||
856 | 4 | 0 | |3 ScienceDirect |u http://www.sciencedirect.com/science/book/9781597492430 |
856 | 4 | |d /webopac/covers/03/47868_9781597492430.jpg | |
856 | 4 | |d /webopac/covers/03/47868_1597492434.jpg | |
856 | 4 | |d /webopac/covers/03/47868_008048896X.jpg | |
856 | 4 | |d /webopac/covers/03/47868_9780080488967.jpg |